CN110473319A - A kind of door opening method of access control system, device, equipment and readable medium - Google Patents
A kind of door opening method of access control system, device, equipment and readable medium Download PDFInfo
- Publication number
- CN110473319A CN110473319A CN201910693693.XA CN201910693693A CN110473319A CN 110473319 A CN110473319 A CN 110473319A CN 201910693693 A CN201910693693 A CN 201910693693A CN 110473319 A CN110473319 A CN 110473319A
- Authority
- CN
- China
- Prior art keywords
- access control
- control system
- key
- door
- gate inhibition
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 230000005764 inhibitory process Effects 0.000 claims abstract description 111
- 238000012795 verification Methods 0.000 claims abstract description 57
- 230000002159 abnormal effect Effects 0.000 claims abstract description 8
- 238000004590 computer program Methods 0.000 claims description 11
- 238000010586 diagram Methods 0.000 description 14
- 230000006870 function Effects 0.000 description 10
- 230000006872 improvement Effects 0.000 description 8
- 230000008569 process Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 238000003780 insertion Methods 0.000 description 2
- 230000037431 insertion Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 229920001296 polysiloxane Polymers 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 239000010979 ruby Substances 0.000 description 1
- 229910001750 ruby Inorganic materials 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Abstract
The invention discloses a kind of door opening methods of access control system, method includes: to work as to detect that gate inhibition's key issues request of opening the door to access control system, the verification information of gate inhibition's key is had previously been stored according to enabling request, and is recorded the sending time for request of opening the door and issued position;Judge whether the verification information of gate inhibition's key is correct;If judge that the verification information of gate inhibition's key is correct, inquiry gate inhibition's key issues the time record for request of opening the door to access control system and position records, and obtains query result;Judge whether the sending time of enabling request and sending position are abnormal according to query result;If judge to open the door the sending time requested and issue malposition, request user carries out the verifying of identity information, to determine whether opening gate system.The present invention when user needs opening gate system, judge gate inhibition's key verification information it is correct under the premise of, it is also necessary to verifying open the door request the sending time and issue position, with achieve the purpose that improve access control system safety.
Description
Technical field
This application involves field of computer technology more particularly to a kind of door opening method of access control system, device, equipment and
Readable medium.
Background technique
Nowadays under the development at full speed of digital technology network technology, access control system has obtained swift and violent development, surmounts already
Simple gateway and key management, plays huge in the Administrations such as work circumstances safe, personnel attendance management
Effect.Access control system is developed on the basis of traditional mechanical door lock, and traditional mechanical door lock is only simple
Mechanical device, no matter how reasonable structure design is, and how firm material is, and people can open it with by various means, nothing
Method guarantees safety;In addition, key pretty troublesome in the management for entering and leaving many channel (as office, the hotel guest room) keys of people
It loses or personnel's replacement will replace together lock & key, operate extremely not convenient, to solve the above-mentioned problems, just go out
Show that safety is higher and the better access control system of convenience.
Mostly be direct verifying gate inhibition's key in the prior art to enter and leave access control system, if gate inhibition's key loss phase and by
Other people utilize, and the safety of access control system hardly results in guarantee.
Summary of the invention
The purpose of the present invention is to solve the shortcomings of the prior art place, provides door opening method, the dress of a kind of access control system
It sets, equipment and readable medium, to achieve the purpose that improve the safety of access control system.
The embodiment of the present application adopts the following technical solutions:
The embodiment of the present application provides a kind of door opening method of access control system, which comprises
It requests when detecting that gate inhibition's key issues to open the door to access control system, is had previously been stored according to the enabling request
The verification information of gate inhibition's key, and record the sending time of the request of opening the door and issue position;
Judge whether the verification information of gate inhibition's key is correct;
If judge that the verification information of gate inhibition's key is correct, inquires gate inhibition's key and access control system sending is opened
The time record and position record of door request, obtain query result;
Judge whether the sending time of the request of opening the door and sending position are abnormal according to the query result;
If judge the sending time of the request of opening the door and issue malposition, request user carries out identity information
Verifying, to determine whether to open the access control system.
Optionally, it is described when detect gate inhibition's key to access control system issue open the door request, according to enablings request obtain
Before taking the verification information for having previously been stored in gate inhibition's key, the method also includes:
It will be stored in the memory of gate inhibition's key by the verification information of access control system certification, wherein the verification information
Including key code and the corresponding MAC Address of key code;
Judge whether the verification information of gate inhibition's key is correct, specifically includes:
Whether the key code and the corresponding MAC Address of key code for judging gate inhibition's key pass through the access control system
Certification.
Optionally, after the verifying of the request user progress identity information, the method also includes:
Whether the identity information for judging the user matches with the identity information for being stored in the access control system;
It is user if judge that the identity information of the user is matched with the identity information for being stored in the access control system
Open the access control system.
Optionally, which is characterized in that the identity information includes face characteristic, fingerprint characteristic, sound characteristic or user
Number information.
The embodiment of the present application also provides a kind of door opener of access control system, described device includes:
Acquiring unit detects that gate inhibition's key issues request of opening the door to access control system for working as, is requested according to the enabling
Obtain the verification information for having previously been stored in gate inhibition's key;
Recording unit, for recording the sending time of the request of opening the door and issuing position;
Whether judging unit, the verification information for judging gate inhibition's key are correct;
Query unit, if when for judging that the verification information of gate inhibition's key is correct, inquiring gate inhibition's key pair
Access control system issues the time record and position record for request of opening the door, and obtains query result;
The judging unit is also used to judge according to the query result sending time of the request of opening the door and issues position
It whether abnormal sets;
Authentication unit, if requesting user when for judging the sending time of the request of opening the door and issue malposition
The verifying of identity information is carried out, to determine whether to open the access control system.
Optionally, described device further include:
Storage element, for the verification information for passing through access control system certification to be stored in the memory of gate inhibition's key, wherein
The verification information includes key code and the corresponding MAC Address of key code;
The judging unit is specifically used for:
Whether the key code and the corresponding MAC Address of key code for judging gate inhibition's key pass through the access control system
Certification.
Optionally, the judging unit is also used to judge the identity information of the user and is stored in the access control system
Whether identity information matches;
Described device further include:
Opening unit, if for judging the identity information of the user and being stored in the identity information of the access control system
When matching, the access control system is opened for user.
Optionally, the identity information includes face characteristic, fingerprint characteristic, sound characteristic or the number information of user.
The embodiment of the present application also provides a kind of computer-readable mediums, are stored thereon with computer-readable instruction, described
Computer-readable instruction can be executed by processor to realize following methods:
It requests when detecting that gate inhibition's key issues to open the door to access control system, is had previously been stored according to the enabling request
The verification information of gate inhibition's key, and record the sending time of the request of opening the door and issue position;
Judge whether the verification information of gate inhibition's key is correct;
If judge that the verification information of gate inhibition's key is correct, inquires gate inhibition's key and access control system sending is opened
The time record and position record of door request, obtain query result;
Judge whether the sending time of the request of opening the door and sending position are abnormal according to the query result;
If judge the sending time of the request of opening the door and issue malposition, request user carries out identity information
Verifying, to determine whether to open the access control system.
The embodiment of the present application also provides a kind of door-opening devices of access control system, which includes for storing computer journey
The memory that sequence instructs and the processor for executing program instructions, wherein when the computer program instructions are held by the processor
When row, triggers the equipment and executes following apparatus:
Acquiring unit detects that gate inhibition's key issues request of opening the door to access control system for working as, is requested according to the enabling
Obtain the verification information for having previously been stored in gate inhibition's key;
Recording unit, for recording the sending time of the request of opening the door and issuing position;
Whether judging unit, the verification information for judging gate inhibition's key are correct;
Query unit, if when for judging that the verification information of gate inhibition's key is correct, inquiring gate inhibition's key pair
Access control system issues the time record and position record for request of opening the door, and obtains query result;
The judging unit is also used to judge according to the query result sending time of the request of opening the door and issues position
It whether abnormal sets;
Authentication unit, if requesting user when for judging the sending time of the request of opening the door and issue malposition
The verifying of identity information is carried out, to determine whether to open the access control system.
The embodiment of the present application use at least one above-mentioned technical solution can reach it is following the utility model has the advantages that
The present invention when user needs opening gate system, judge gate inhibition's key verification information it is correct under the premise of,
Need to verify open the door the sending time requested and sending position, also to achieve the purpose that improve access control system safety.
Detailed description of the invention
In order to illustrate more clearly of this specification embodiment or technical solution in the prior art, below will to embodiment or
Attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only
The some embodiments recorded in this specification, for those of ordinary skill in the art, in not making the creative labor property
Under the premise of, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow diagram of the door opening method for the access control system that this specification embodiment one provides;
Fig. 2 is the flow diagram of the door opening method for the access control system that this specification embodiment two provides;
Fig. 3 is the structural schematic diagram of the door opener for the access control system that this specification embodiment three provides.
Specific embodiment
Mostly be direct verifying gate inhibition's key in the prior art to enter and leave access control system, if gate inhibition's key loss phase and by
Other people utilize, and the safety of access control system hardly results in guarantee.
In order to solve above-mentioned technical problem, the present invention proposes following scheme, specifically real below in conjunction with the application
It applies example and technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only this
Apply for a part of the embodiment, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art exist
Every other embodiment obtained under the premise of creative work is not made, shall fall in the protection scope of this application.
Fig. 1 is a kind of flow diagram of the door opening method for access control system that this specification embodiment one provides, the process
Schematic diagram includes:
Step S101 is requested when detecting that gate inhibition's key issues to open the door to access control system, according to the enabling request
The verification information of gate inhibition's key is had previously been stored in, and records the sending time of the request of opening the door and issues position.
Step S102 judges whether the verification information of gate inhibition's key is correct, if so, thening follow the steps S103;If it is not,
Then illustrate that gate inhibition's key mismatches the access control system, alarm system can be set in access control system, once discovery mismatches
Gate inhibition's key of the access control system is come when opening the access control system, it will sends a warning.
Step S103 inquires time record and position record that gate inhibition's key issues request of opening the door to access control system,
Obtain query result.
Step S104 judges whether the sending time of the request of opening the door and sending position are different according to the query result
Often, if so, thening follow the steps S105;If it is not, then opening gate system.
Step S105, request user carries out the verifying of identity information, to determine whether to open the access control system.
The present invention when user needs opening gate system, judge gate inhibition's key verification information it is correct under the premise of,
Also need to verify open the door the sending time requested and sending position, if user loses gate inhibition's key and is obtained by other people, because
Access control system has recorded time and the position that gate inhibition's key issues request of opening the door to access control system, other people are using gate inhibition's key
The very big time that may issue request of opening the door to access control system with gate inhibition's key of record and position are different when spoon, access control system one
When denier judges request time and malposition, it will request carries out the verifying of identity information, improves access control system peace to reach
The purpose of full property.
Corresponding with above-described embodiment one, the embodiment of the present invention two additionally provides the door opening method of access control system, specific real
The flow diagram of the door opening method of step access control system shown in Figure 2 is applied, which includes:
Step S201 will be stored in the memory of gate inhibition's key, wherein described by the verification information of access control system certification
Verification information includes key code and the corresponding MAC Address of key code.
In the step S201 of this specification embodiment, gate inhibition's coding can be generated by encoder.MAC(Media
Access Control, medium access control) address, for defining the position of the network equipment.MAC is integrated in network interface card, by 48bit
16 systems number composition, 0~23 bit digital be tissue unique identifier (organizationally unique, be identification
The mark of LAN node).24~47 are distributed by producer oneself, wherein the 48th is multicast address flag bit.Network interface card
Physical address is usually in the EPROM chip by network interface card manufacturer write-in network interface card, data in chip can by program into
Row is erasable, and mark of really relying when what it was stored is transmission data issues the computer of data and receives the address of the host of data.
That is, data transmission is to identify host by physical address, it is certain during the physical transfer of network bottom layer
It is globally unique.
Step S202 is requested when detecting that gate inhibition's key issues to open the door to access control system, according to the enabling request
It is stored in the verification information of gate inhibition's key, and records the sending time of the request of opening the door and issues position.
In the step S202 of this specification embodiment, gate inhibition's key can be IC card.Open the door request the sending time and
Issue position can time for user's brush IC card door opening request and position, for example, user on Monday to Friday door opening request when
Between at 9 points in the morning and 6 pm (user's working and next time can be expressed as), sending position is A (access control systems
There are multiple doors, may include A, B, C, and user's door opening request is A, it can be understood as the user distance is compared with A
It is closer), certainly, user may also be in other times door opening request or other positions door opening request, and access control system can ask at this time
User is asked to carry out the verifying of identity information, wherein access control system can recorde the sending time for request of opening the door every time and issue position
It sets, enabling request number of times most period can be defined as normally issuing the time, can be most by enabling request number of times
Position is defined as normally issuing position, when there are other times or other positions door opening request, according to subsequent step, door
Access control system will request the verifying of user's progress identity information.
Step S203 judges whether the verification information of gate inhibition's key is correct, if so, thening follow the steps S204;If it is not,
Then illustrate that gate inhibition's key mismatches the access control system, alarm system can be set in access control system, once discovery mismatches
Gate inhibition's key of the access control system is come when opening the access control system, it will sends a warning.
Judge whether the verification information of gate inhibition's key is correct, specifically includes:
Whether the key code and the corresponding MAC Address of key code for judging gate inhibition's key pass through the access control system
Certification.
Step S204 inquires time record and position record that gate inhibition's key issues request of opening the door to access control system,
Obtain query result.
Step S205 judges whether the sending time of the request of opening the door and sending position are different according to the query result
Often, if so, thening follow the steps S206;If it is not, then opening gate system.
Step S206, request user carries out the verifying of identity information, to determine whether to open the access control system.
Step S207, judge the identity information of the user be stored in the access control system identity information whether phase
Match, if so, S208 is thened follow the steps,;If it is not, then illustrate that gate inhibition's key mismatches the access control system, it can be by alarm system
It sends a warning.
In the step S207 of this specification embodiment, identity information include face characteristic, fingerprint characteristic, sound characteristic or
The number information of person user.When needing user's checking identity information can using face characteristic, fingerprint characteristic, sound characteristic and
One of number information of user or various ways are verified, to ensure the accuracy of user identity.
Step S208 opens the access control system for user.
The present invention when user needs opening gate system, judge gate inhibition's key verification information it is correct under the premise of,
Also need to verify open the door the sending time requested and sending position, if user loses gate inhibition's key and is obtained by other people, because
Access control system has recorded time and the position that gate inhibition's key issues request of opening the door to access control system, other people are using gate inhibition's key
The very big time that may issue request of opening the door to access control system with gate inhibition's key of record and position are different when spoon, access control system one
When denier judges request time and malposition, it will request carries out the verifying of identity information, improves access control system peace to reach
The purpose of full property.
Corresponding with above-described embodiment two, the embodiment of the present invention three additionally provides the door opener of access control system, specific real
Apply the structural schematic diagram of the door opener of step access control system shown in Figure 3, the structural schematic diagram include: acquiring unit 1,
Recording unit 2, judging unit 3, query unit 4, authentication unit 5, storage element 6 and opening unit 7.
Acquiring unit 1, which is used to work as, detects that gate inhibition's key issues request of opening the door to access control system, is requested according to the enabling
Obtain the verification information for having previously been stored in gate inhibition's key.
Recording unit 2 is used to record the sending time of the request of opening the door and issues position.
Judging unit 3 is for judging whether the verification information of gate inhibition's key is correct.
If query unit 4 is for inquiring gate inhibition's key pair when judging that the verification information of gate inhibition's key is correct
Access control system issues the time record and position record for request of opening the door, and obtains query result.
Judging unit 3 is also used to judge according to the query result sending time of the request of opening the door and issues position
No exception.
If authentication unit 5 is used to judge the sending time of the request of opening the door and issues malposition, user is requested
The verifying of identity information is carried out, to determine whether to open the access control system.
Storage element 6 is used to be stored in the memory of gate inhibition's key by the verification information of access control system certification, wherein
The verification information includes key code and the corresponding MAC Address of key code.
Judging unit 3 is specifically used for:
Whether the key code and the corresponding MAC Address of key code for judging gate inhibition's key pass through the access control system
Certification.
Judging unit 3 is also used to judge that the identity information of the user is with the identity information for being stored in the access control system
It is no to match.
If opening unit 7 is for judging the identity information of the user and being stored in the identity information of the access control system
When matching, the access control system is opened for user.
Identity information includes face characteristic, fingerprint characteristic, sound characteristic or the number information of user.
The present invention when user needs opening gate system, judge gate inhibition's key verification information it is correct under the premise of,
Also need to verify open the door the sending time requested and sending position, if user loses gate inhibition's key and is obtained by other people, because
Access control system has recorded time and the position that gate inhibition's key issues request of opening the door to access control system, other people are using gate inhibition's key
The very big time that may issue request of opening the door to access control system with gate inhibition's key of record and position are different when spoon, access control system one
When denier judges request time and malposition, it will request carries out the verifying of identity information, improves access control system peace to reach
The purpose of full property.
The embodiment of the present application also provides a kind of computer-readable mediums, are stored thereon with computer-readable instruction, described
Computer-readable instruction can be executed by processor to realize following methods:
It requests when detecting that gate inhibition's key issues to open the door to access control system, is had previously been stored according to the enabling request
The verification information of gate inhibition's key, and record the sending time of the request of opening the door and issue position;
Judge whether the verification information of gate inhibition's key is correct;
If judge that the verification information of gate inhibition's key is correct, inquires gate inhibition's key and access control system sending is opened
The time record and position record of door request, obtain query result;
Judge whether the sending time of the request of opening the door and sending position are abnormal according to the query result;
If judge the sending time of the request of opening the door and issue malposition, request user carries out identity information
Verifying, to determine whether to open the access control system.
The embodiment of the present application also provides a kind of door-opening devices of access control system, which includes for storing computer journey
The memory that sequence instructs and the processor for executing program instructions, wherein when the computer program instructions are held by the processor
When row, triggers the equipment and executes following apparatus:
Acquiring unit detects that gate inhibition's key issues request of opening the door to access control system for working as, is requested according to the enabling
Obtain the verification information for having previously been stored in gate inhibition's key;
Recording unit, for recording the sending time of the request of opening the door and issuing position;
Whether judging unit, the verification information for judging gate inhibition's key are correct;
Query unit, if when for judging that the verification information of gate inhibition's key is correct, inquiring gate inhibition's key pair
Access control system issues the time record and position record for request of opening the door, and obtains query result;
The judging unit is also used to judge according to the query result sending time of the request of opening the door and issues position
It whether abnormal sets;
Authentication unit, if requesting user when for judging the sending time of the request of opening the door and issue malposition
The verifying of identity information is carried out, to determine whether to open the access control system.
The present invention when user needs opening gate system, judge gate inhibition's key verification information it is correct under the premise of,
Also need to verify open the door the sending time requested and sending position, if user loses gate inhibition's key and is obtained by other people, because
Access control system has recorded time and the position that gate inhibition's key issues request of opening the door to access control system, other people are using gate inhibition's key
The very big time that may issue request of opening the door to access control system with gate inhibition's key of record and position are different when spoon, access control system one
When denier judges request time and malposition, it will request carries out the verifying of identity information, improves access control system peace to reach
The purpose of full property.
In the 1990s, the improvement of a technology can be distinguished clearly be on hardware improvement (for example,
Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So
And with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit.
Designer nearly all obtains corresponding hardware circuit by the way that improved method flow to be programmed into hardware circuit.Cause
This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device
(Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate
Array, FPGA)) it is exactly such a integrated circuit, logic function determines device programming by user.By designer
Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, designs and makes without asking chip maker
Dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " is patrolled
Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development,
And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language
(Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many kind, such as ABEL
(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description
Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL
(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby
Hardware Description Language) etc., VHDL (Very-High-Speed is most generally used at present
Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also answer
This understands, it is only necessary to method flow slightly programming in logic and is programmed into integrated circuit with above-mentioned several hardware description languages,
The hardware circuit for realizing the logical method process can be readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing
The computer for the computer readable program code (such as software or firmware) that device and storage can be executed by (micro-) processor can
Read medium, logic gate, switch, specific integrated circuit (Application Specific Integrated Circuit,
ASIC), the form of programmable logic controller (PLC) and insertion microcontroller, the example of controller includes but is not limited to following microcontroller
Device: ARC625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320 are deposited
Memory controller is also implemented as a part of the control logic of memory.It is also known in the art that in addition to
Pure computer readable program code mode is realized other than controller, can be made completely by the way that method and step is carried out programming in logic
Controller is obtained to come in fact in the form of logic gate, switch, specific integrated circuit, programmable logic controller (PLC) and insertion microcontroller etc.
Existing identical function.Therefore this controller is considered a kind of hardware component, and to including for realizing various in it
The device of function can also be considered as the structure in hardware component.Or even, it can will be regarded for realizing the device of various functions
For either the software module of implementation method can be the structure in hardware component again.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
The combination of equipment.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this
The function of each unit can be realized in the same or multiple software and or hardware when application.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program
Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group
Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by
Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with
In the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art
For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal
Replacement, improvement etc., should be included within the scope of the claims of this application.
Claims (10)
1. a kind of door opening method of access control system, which is characterized in that the described method includes:
It requests, is had previously been stored according to the enabling request described when detecting that gate inhibition's key issues to open the door to access control system
The verification information of gate inhibition's key, and record the sending time of the request of opening the door and issue position;
Judge whether the verification information of gate inhibition's key is correct;
If judge that the verification information of gate inhibition's key is correct, inquires gate inhibition's key and access control system sending enabling is asked
The time record and position record asked, obtain query result;
Judge whether the sending time of the request of opening the door and sending position are abnormal according to the query result;
If judge the sending time of the request of opening the door and issue malposition, request user carries out testing for identity information
Card, to determine whether to open the access control system.
2. the door opening method of access control system according to claim 1, which is characterized in that described to detect gate inhibition's key pair
Access control system issue open the door request, according to the enabling request have previously been stored in gate inhibition's key verification information it
Before, the method also includes:
It will be stored in the memory of gate inhibition's key by the verification information of access control system certification, wherein the verification information includes
Key code and the corresponding MAC Address of key code;
Judge whether the verification information of gate inhibition's key is correct, specifically includes:
Whether the key code and the corresponding MAC Address of key code for judging gate inhibition's key are recognized by the access control system
Card.
3. the door opening method of access control system according to claim 1, which is characterized in that the request user carries out identity letter
After the verifying of breath, the method also includes:
Whether the identity information for judging the user matches with the identity information for being stored in the access control system;
If judge that the identity information of the user is matched with the identity information for being stored in the access control system, opened for user
The access control system.
4. the door opening method of access control system according to claim 1, which is characterized in that the identity information includes face spy
Sign, fingerprint characteristic, sound characteristic or the number information of user.
5. a kind of door opener of access control system, which is characterized in that described device includes:
Acquiring unit detects that gate inhibition's key issues request of opening the door to access control system for working as, according to the enabling request
Have previously been stored in the verification information of gate inhibition's key;
Recording unit, for recording the sending time of the request of opening the door and issuing position;
Whether judging unit, the verification information for judging gate inhibition's key are correct;
Query unit, if when for judging that the verification information of gate inhibition's key is correct, inquiring gate inhibition's key to gate inhibition
System issues the time record and position record for request of opening the door, and obtains query result;
The judging unit is also used to judge according to the query result sending time of the request of opening the door and issues position
No exception;
Authentication unit, if request user carries out when for judging the sending time of the request of opening the door and issue malposition
The verifying of identity information, to determine whether to open the access control system.
6. the door opener of access control system according to claim 5, which is characterized in that described device further include:
Storage element, for the verification information for passing through access control system certification to be stored in the memory of gate inhibition's key, wherein described
Verification information includes key code and the corresponding MAC Address of key code;
The judging unit is specifically used for:
Whether the key code and the corresponding MAC Address of key code for judging gate inhibition's key are recognized by the access control system
Card.
7. the door opener of access control system according to claim 5, which is characterized in that the judging unit is also used to judge
Whether the identity information of the user matches with the identity information for being stored in the access control system;
Described device further include:
Opening unit, if for judging that the identity information of the user is matched with the identity information for being stored in the access control system
When, the access control system is opened for user.
8. the door opener of access control system according to claim 5, which is characterized in that the identity information includes face spy
Sign, fingerprint characteristic, sound characteristic or the number information of user.
9. a kind of computer-readable medium, is stored thereon with computer-readable instruction, the computer-readable instruction can be processed
Device is executed to realize method described in any one of Claims 1-4.
10. a kind of door-opening devices of access control system, which includes memory for storing computer program instructions and is used for
The processor executed program instructions, wherein when the computer program instructions are executed by the processor, trigger the equipment right of execution
Benefit requires the described in any item devices of 5-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910693693.XA CN110473319A (en) | 2019-07-30 | 2019-07-30 | A kind of door opening method of access control system, device, equipment and readable medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910693693.XA CN110473319A (en) | 2019-07-30 | 2019-07-30 | A kind of door opening method of access control system, device, equipment and readable medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110473319A true CN110473319A (en) | 2019-11-19 |
Family
ID=68509872
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910693693.XA Pending CN110473319A (en) | 2019-07-30 | 2019-07-30 | A kind of door opening method of access control system, device, equipment and readable medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110473319A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111292448A (en) * | 2020-02-20 | 2020-06-16 | 深圳市春晖信档案技术服务有限公司 | File cabinet, centralized file management terminal and file management method |
CN113132106A (en) * | 2019-12-30 | 2021-07-16 | 中国移动通信集团山西有限公司 | User identity recognition system |
CN113392392A (en) * | 2021-03-31 | 2021-09-14 | 中富通集团股份有限公司 | CTID-based intelligent terminal verification method, intelligent door lock and access control system |
CN116863576A (en) * | 2023-09-04 | 2023-10-10 | 民航成都电子技术有限责任公司 | Method, system and medium for synchronizing passage information of aircrew |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105069874A (en) * | 2015-07-28 | 2015-11-18 | 北京航空航天大学 | Mobile internet voiceprint entrance guard system and implementation method thereof |
CN105069876A (en) * | 2015-08-04 | 2015-11-18 | 珠海格力电器股份有限公司 | Control method and system for intelligent access control |
CN108230525A (en) * | 2018-03-27 | 2018-06-29 | 河南省国泰安信息技术有限公司 | Access control management method and gate inhibition management apparatus |
CN109830022A (en) * | 2019-02-28 | 2019-05-31 | 重庆工商职业学院 | Intelligent estate management system |
-
2019
- 2019-07-30 CN CN201910693693.XA patent/CN110473319A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105069874A (en) * | 2015-07-28 | 2015-11-18 | 北京航空航天大学 | Mobile internet voiceprint entrance guard system and implementation method thereof |
CN105069876A (en) * | 2015-08-04 | 2015-11-18 | 珠海格力电器股份有限公司 | Control method and system for intelligent access control |
CN108230525A (en) * | 2018-03-27 | 2018-06-29 | 河南省国泰安信息技术有限公司 | Access control management method and gate inhibition management apparatus |
CN109830022A (en) * | 2019-02-28 | 2019-05-31 | 重庆工商职业学院 | Intelligent estate management system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113132106A (en) * | 2019-12-30 | 2021-07-16 | 中国移动通信集团山西有限公司 | User identity recognition system |
CN113132106B (en) * | 2019-12-30 | 2023-08-18 | 中国移动通信集团山西有限公司 | User identity recognition system |
CN111292448A (en) * | 2020-02-20 | 2020-06-16 | 深圳市春晖信档案技术服务有限公司 | File cabinet, centralized file management terminal and file management method |
CN113392392A (en) * | 2021-03-31 | 2021-09-14 | 中富通集团股份有限公司 | CTID-based intelligent terminal verification method, intelligent door lock and access control system |
CN116863576A (en) * | 2023-09-04 | 2023-10-10 | 民航成都电子技术有限责任公司 | Method, system and medium for synchronizing passage information of aircrew |
CN116863576B (en) * | 2023-09-04 | 2023-12-22 | 民航成都电子技术有限责任公司 | Method, system and medium for synchronizing passage information of aircrew |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110473319A (en) | A kind of door opening method of access control system, device, equipment and readable medium | |
CN107392040B (en) | A kind of method and device of common recognition verifying | |
EP3531656B1 (en) | Block chain-based data processing method and device | |
CN107562775A (en) | A kind of data processing method and equipment based on block chain | |
US10432622B2 (en) | Securing biometric data through template distribution | |
CN110009388A (en) | Equipment leasing method, apparatus, equipment and storage medium | |
CN108881120A (en) | A kind of data processing method and equipment based on block chain | |
CN110162981A (en) | Data processing method and device | |
CN108055132A (en) | The method, apparatus and equipment of a kind of service authorization | |
CN110335036A (en) | Processing, generation method and the device of off-line graphical code | |
CN110032880A (en) | Record screen evidence collecting method, system and electronic equipment based on block chain | |
CN109993530A (en) | A kind of virtual resource management method, device and electronic equipment | |
CN108959341A (en) | A kind of method, device and equipment that data are synchronous | |
CN107679700A (en) | Business flow processing method, apparatus and server | |
CN110196889A (en) | Data processing method, device, electronic equipment and storage medium | |
TWI788662B (en) | Security authentication method, method for training security authentication model, security authentication device, training device for security authentication model, electronic device, and computer-readable storage medium | |
CN109460643A (en) | A kind of smart machine control method, device and equipment | |
CN110222531A (en) | A kind of method, system and equipment accessing database | |
CN107018174A (en) | A kind of method, device and the transaction processing system of blocking system service processing | |
CN109241026A (en) | The method, apparatus and system of data management | |
CN110443917A (en) | Detection method, device and the equipment that electronic switch door gear and electronic cutting are closed the door | |
CN109240848A (en) | A kind of data object tag generation method and device | |
CN109922298A (en) | Meeting room monitoring method and device | |
CN108074024A (en) | Risk Identification Method, apparatus and system | |
CN109583190A (en) | The method and apparatus of monitoring process |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191119 |